USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 15 results:
Filters: Author is Somesh Jha [Clear All Filters]
Fairness Properties of Face Recognition and Obfuscation Systems. 32nd USENIX Security Symposium (USENIX Security 23). :7231--7248.
.
2023. Exploring Connections Between Active Learning and Model Extraction. 29th USENIX Security Symposium (USENIX Security 20). :1309--1326.
.
2020. Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :241--254.
.
2018. Locally Differentially Private Protocols for Frequency Estimation. 26th USENIX Security Symposium (USENIX Security 17). :729--745.
.
2017. Practical DIFC Enforcement on Android. 25th USENIX Security Symposium (USENIX Security 16). :1119--1136.
.
2016. LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes. 23rd USENIX Security Symposium (USENIX Security 14). :877--891.
.
2014. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. 23rd USENIX Security Symposium (USENIX Security 14). :17--32.
.
2014. Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. 22nd USENIX Security Symposium (USENIX Security 13). :543--558.
.
2013. FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. 22nd USENIX Security Symposium (USENIX Security 13). :463--478.
.
2013. Automatic Generation of Remediation Procedures for Malware Infections. 19th USENIX Security Symposium (USENIX Security 10).
.
2010. Microdrivers: A New Architecture for Device Drivers. 11th Workshop on Hot Topics in Operating Systems (HotOS XI).
.
2007. An Architecture for Generating Semantic Aware Signatures. 14th USENIX Security Symposium (USENIX Security 05).
.
2005. A Logic of File Systems. 4th USENIX Conference on File and Storage Technologies (FAST 05).
.
2005. Static Analysis of Executables to Detect Malicious Patterns. 12th USENIX Security Symposium (USENIX Security 03).
.
2003. Detecting Manipulated Remote Call Streams. 11th USENIX Security Symposium (USENIX Security 02).
.
2002.